CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project Currently the project manager is Nanni Bassetti. CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface. The main design objectives that CAINE aims …
Tag: Hash
Permanent link to this article: https://www.darknessgate.com/2015/01/24/caine-computer-aided-investigative-environment/
Alpine Linux
Alpine Linux is a community-developed operating system designed for x86 Routers, Firewalls, VPNs, VoIP and servers. Alpine Linux is and always will be free of charge. You do not pay any licensing fees. You can download, use and share Alpine Linux with anyone for absolutely nothing. Alpine Linux was designed with security in mind. It …
Permanent link to this article: https://www.darknessgate.com/2014/11/17/alpine-linux/
BackBox Linux
BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known …
Permanent link to this article: https://www.darknessgate.com/2014/11/17/backbox-linux/
Cisco CCNA Video Lecture
Video Lectures, Video Courses, Science Animations, Lecture Notes, Online Test, Lecture Presentations. http://www.learnerstv.com/Free-Computer-Science-Video-lectures-ltv578-Page1.htm
Permanent link to this article: https://www.darknessgate.com/2014/09/26/cisco-ccna-video-lecture/
Cryptography from Fachbereich Informatik
This lecture deals with the following cryptographic topics: Cryptographic Foundations (security goals, historical ciphers, AES, a sketch of RSA) Foundations of information theory (terms, probability theory, Shannon’s theorem) Entropy Design principles of cryptographic hash functions Pseudo random number generators and stream ciphers A sketch of elliptic curve cryptography Quantum cryptography Implementation issues (efficiency, obfuscation) https://www.fbi.h-da.de/organisation/personen/baier-harald/teaching/lectures-summer-term-2012/cryptography.html
Permanent link to this article: https://www.darknessgate.com/2014/09/25/cryptography-fachbereich-informatik/
Cryptography and Protocols – Spring 2014
http://www.cs.sfu.ca/CourseCentral/404/abulatov/
Permanent link to this article: https://www.darknessgate.com/2014/09/20/cryptography-protocols-spring-2014/
Introduction to Modern Cryptography 2012
Cryptography has a very long and exciting history. For centuries, political leaders and military forces have used cryptographic techniques, primarily to communicate securely. Modern cryptography is concerned with an enormous variety of scenarios where the involved parties do not fully trust each other such as internet banking, electronic voting, integrity of data, security of computer …
Permanent link to this article: https://www.darknessgate.com/2014/09/18/introduction-modern-cryptography-2012/
TSIT03 Cryptology 2013
The course covers – the reasons for using cryptography in computer systems – what basic classes of algorithms there are, how they differ and how they should be used in different situations – the basic criteria for each algorithm class – how to find the characteristics of given pseudorandom number generators and how to construct …
Permanent link to this article: https://www.darknessgate.com/2014/09/08/tsit03-cryptology-2013/
CNIT 121: Computer Forensics
The class covers forensics tools, methods, and procedures used for investigation of computers, techniques of data recovery and evidence collection, protection of evidence, expert witness skills, and computer crime investigation techniques. Includes analysis of various file systems and specialized diagnostic software used to retrieve data. Upon successful completion of this course, the student will be …
Permanent link to this article: https://www.darknessgate.com/2014/09/06/cnit-121-computer-forensics/
CSE571S: Network Security (Fall 2011)
A comprehensive treatment of network security. Topics include virus, root kits, malware, TCP/IP security attacks, operating systems security, secret key cryptography, modes of operation, hashes and message digests, public key algorithms, authentication systems, Kerberos, Public Key Infrastructures (PKI), IPsec, Internet Key Exchange (IKE), Secure Socket Layer (SSL), Transport Layer Security (TLS), e-mail security, virtual private …
Permanent link to this article: https://www.darknessgate.com/2014/09/04/cse571s-network-security-fall-2011/
Applied Cryptography
Have you wondered how one might define security — even for a cryptographic concept as simple and familiar as encryption? What makes public-key cryptography possible? (Well, what is public-key cryptography?) What is MD5 and what’s wrong with it? What is homomorphic encryption? What are zero-knowledge proofs (and are they for real)? What magical tools can …
Permanent link to this article: https://www.darknessgate.com/2014/09/01/applied-cryptography/